Despicable Coronavirus Phishing Attack

2nd April 2020 | Blog, Newsletters Despicable Coronavirus Phishing Attack

Hackers use our Worst Fears Against Us

The latest in a series of coronavirus related phishing attacks may be the most believable yet. Hackers are sending hospital notifications to unsuspecting email recipients notifying them that a friend, colleague, or family member tested positive for COVID-19 and reported you as being exposed. The email states it is your civic responsibility to download and complete the “pre-filled” paperwork to prevent the spread and limit deaths from this virus.

Attachments Contain Sophisticated Malware

When people open the attachment, the malware installs on your machine and compromises it. Various bad things happen at this point. Your computer data is fully encrypted until you pay a ransom. Malware sits in the background stealing and sending your passwords to the hackers to breach more of your accounts. Still, other malware uses your system resources to farm for bitcoinsNo good can come from unsolicited attachments you open!

Spot and Avoid the Phishing Attacks

  1. ​Do not click any links in emails you did not expect.
    • Emails containing links to fake COVID or fake Zoom websites are rampant!
  2. Be extremely careful when searching for COVID-19 or Coronavirus info. Visit only reputable websites you type in yourself. Here are some good safe ones:
  3. Generically addressed emails are HUGE red flags.
  4. Poor spelling, grammar, and punctuation are all red flags.
  5. Emailed attachments are very dangerous!
    • Never open attachments you did not request!
  6. An unexpected email urging you to take action is bad.

Congratulations! You read to the end.  You are becoming more cyber-aware, and with awareness, you’re more secure!

Coronavirus Phishing Attack Warnings from Secret Service (4 min video):

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more
Malicious Chrome Extension Disguised as  a Business Tools

Malicious Chrome Extension Disguised as a Business Tools

If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...

Read more
Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more